Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present StatusImam, Raza ; Areeb, Qazi Mohammad ; Alturki, Abdulrahman ; Anwer, FaisalIEEE access, 2021, Vol.9, p.155949-155976 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitivesAnandakumar, N. Nalla ; Hashmi, Mohammad S. ; Sanadhya, Somitra KumarIET circuits, devices & systems, 2022-08, Vol.16 (5), p.382-398 [Periódico revisado por pares]Texto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Towards quantum‐secure software defined networksNosouhi, Mohammad Reza ; Sood, Keshav ; Chamola, Vinay ; Jeong, Jongkil Jay ; Gaddam, AnuroopIET quantum communication, 2024-03, Vol.5 (1), p.66-71 [Periódico revisado por pares]WileyTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
GRP-based interleaver for IDMA systems over frequency selective channelBelaoura, W ; Djeddou, M ; Ghanem, KElectronics letters, 2015-09, Vol.51 (18), p.1462-1464 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Frequency Domain Horizontal Cross Correlation Analysis of RSAAKALP KUZU, E. ; TANGEL, A. ; ORS YALCIN, S. B.Advances in Electrical and Computer Engineering, 2022-05, Vol.22 (2), p.3-10 [Periódico revisado por pares]Suceava: Stefan cel Mare University of SuceavaTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
A modified remote user authentication scheme using smart cardsShen, Jau-Ji ; Lin, Chih-Wei ; Hwang, Min-ShiangIEEE transactions on consumer electronics, 2003-05, Vol.49 (2), p.414-416 [Periódico revisado por pares]New York: IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial EnvironmentsMing Yu, Ming Yu ; Mengchu Zhou, Mengchu Zhou ; Wei Su, Wei SuIEEE transactions on vehicular technology, 2009-01, Vol.58 (1), p.449-460 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
Security as a new dimension in embedded system designKocher, Paul ; Lee, Ruby ; McGraw, Gary ; Raghunathan, AnandAnnual ACM IEEE Design Automation Conference: Proceedings of the 41st annual conference on Design automation, 2004, p.753-760New York, NY, USA: ACMTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
An efficient identity-based cryptosystem for end-to-end mobile securityHwu, J.-S. ; Chen, R.-J. ; Lin, Y.-B.IEEE transactions on wireless communications, 2006-09, Vol.5 (9), p.2586-2593 [Periódico revisado por pares]Piscataway, NJ: IEEETexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Fingerprinting protocol for images based on additive homomorphic propertyKuribayashi, M. ; Tanaka, H.IEEE transactions on image processing, 2005-12, Vol.14 (12), p.2129-2139 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |